必须是合法有效的IP地址, 可以是IPv4或者是IPv6, 例如127.0.0.1或者2001:DB8:0:0:8:800:200C:417A
基本信息:

城市(city): unknown

省份(region): unknown

国家(country): Netherlands (the)

运营商(isp): unknown

主机名(hostname): unknown

机构(organization): unknown

使用类型(Usage Type): unknown

用户上报:
暂无关于此IP的讨论, 沙发请点上方按钮
相同子网IP讨论:
暂无关于此IP所属子网相关IP的讨论.
WHOIS信息:
b
DIG信息:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 194.120.147.139
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 16055
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;194.120.147.139.		IN	A

;; AUTHORITY SECTION:
.			29	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020301 1800 900 604800 86400

;; Query time: 59 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 04 02:08:47 CST 2025
;; MSG SIZE  rcvd: 108
HOST信息:
139.147.120.194.in-addr.arpa domain name pointer 194-120-147-139.biz.kpn.net.
NSLOOKUP信息:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
139.147.120.194.in-addr.arpa	name = 194-120-147-139.biz.kpn.net.

Authoritative answers can be found from:
相关IP信息:
最新评论:
IP 类型 评论内容 时间
178.128.144.14 attackspam
2020-04-18T05:11:57.731969homeassistant sshd[24457]: Invalid user oi from 178.128.144.14 port 54374
2020-04-18T05:11:57.738449homeassistant sshd[24457]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.144.14
...
2020-04-18 19:02:38
89.248.168.221 attackbotsspam
Apr 18 12:43:28 debian-2gb-nbg1-2 kernel: \[9465580.031965\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=89.248.168.221 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=247 ID=20870 PROTO=TCP SPT=45053 DPT=36281 WINDOW=1024 RES=0x00 SYN URGP=0
2020-04-18 18:54:04
68.116.41.6 attackspambots
Apr 18 17:07:46 itv-usvr-01 sshd[14087]: Invalid user gy from 68.116.41.6
Apr 18 17:07:46 itv-usvr-01 sshd[14087]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.116.41.6
Apr 18 17:07:46 itv-usvr-01 sshd[14087]: Invalid user gy from 68.116.41.6
Apr 18 17:07:48 itv-usvr-01 sshd[14087]: Failed password for invalid user gy from 68.116.41.6 port 44780 ssh2
2020-04-18 18:44:08
172.245.183.16 attack
firewall-block, port(s): 8088/tcp
2020-04-18 18:55:44
106.13.102.141 attack
2020-04-17 UTC: (20x) - Ubuntu,admin(3x),admin1,bm,hh,ht,mq,oracle,root(4x),test(2x),test1,teste,we,wz
2020-04-18 18:50:32
46.105.29.160 attackspambots
Brute-force attempt banned
2020-04-18 18:42:33
180.76.135.236 attack
Apr 18 12:02:42 roki sshd[3692]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.76.135.236  user=root
Apr 18 12:02:44 roki sshd[3692]: Failed password for root from 180.76.135.236 port 45310 ssh2
Apr 18 12:09:29 roki sshd[4229]: Invalid user at from 180.76.135.236
Apr 18 12:09:29 roki sshd[4229]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.76.135.236
Apr 18 12:09:31 roki sshd[4229]: Failed password for invalid user at from 180.76.135.236 port 53822 ssh2
...
2020-04-18 18:46:32
77.247.109.5 attackspam
Apr 18 10:50:50 debian-2gb-nbg1-2 kernel: \[9458822.573585\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=77.247.109.5 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=245 ID=49989 PROTO=TCP SPT=57661 DPT=8888 WINDOW=1024 RES=0x00 SYN URGP=0
2020-04-18 18:47:53
223.240.118.5 attackbotsspam
7865:Apr 17 03:44:21 fmk sshd[28767]: Invalid user test1 from 223.240.118.5 port 58203
7867:Apr 17 03:44:21 fmk sshd[28767]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=223.240.118.5 
7868:Apr 17 03:44:23 fmk sshd[28767]: Failed password for invalid user test1 from 223.240.118.5 port 58203 ssh2
7869:Apr 17 03:44:24 fmk sshd[28767]: Received disconnect from 223.240.118.5 port 58203:11: Bye Bye [preauth]
7870:Apr 17 03:44:24 fmk sshd[28767]: Disconnected from invalid user test1 223.240.118.5 port 58203 [preauth]
7894:Apr 17 03:56:40 fmk sshd[28868]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=223.240.118.5  user=r.r
7895:Apr 17 03:56:41 fmk sshd[28868]: Failed password for r.r from 223.240.118.5 port 36279 ssh2
7896:Apr 17 03:56:42 fmk sshd[28868]: Received disconnect from 223.240.118.5 port 36279:11: Bye Bye [preauth]
7897:Apr 17 03:56:42 fmk sshd[28868]: Disconnected from authenticati........
------------------------------
2020-04-18 19:02:13
46.161.27.75 attackbotsspam
Apr 18 12:34:00 debian-2gb-nbg1-2 kernel: \[9465012.807227\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=46.161.27.75 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=246 ID=49995 PROTO=TCP SPT=59977 DPT=8887 WINDOW=1024 RES=0x00 SYN URGP=0
2020-04-18 18:47:04
49.233.88.126 attackspam
SSH Brute-Forcing (server2)
2020-04-18 18:24:30
112.85.42.187 attackspambots
DATE:2020-04-18 11:43:59, IP:112.85.42.187, PORT:ssh SSH brute force auth on honeypot server (epe-honey1-hq)
2020-04-18 18:43:27
35.188.62.96 attack
Unauthorized connection attempt detected from IP address 35.188.62.96 to port 2222
2020-04-18 18:52:27
222.186.175.154 attack
Apr 18 10:20:25 ip-172-31-61-156 sshd[30690]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.154  user=root
Apr 18 10:20:26 ip-172-31-61-156 sshd[30690]: Failed password for root from 222.186.175.154 port 32346 ssh2
...
2020-04-18 18:25:35
31.185.104.21 attack
CMS (WordPress or Joomla) login attempt.
2020-04-18 18:30:03

最近上报的IP列表

2.131.223.127 97.21.152.161 76.31.245.136 130.145.17.216
137.29.128.200 240.177.194.129 80.212.200.32 24.119.159.226
176.158.0.42 21.131.109.1 80.169.16.29 76.120.14.142
239.104.203.19 69.106.131.218 243.100.149.145 99.177.109.139
91.150.68.45 200.3.201.101 124.158.15.105 240.224.15.150